Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an example of a computer used as an instrument of crime?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

D

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

A

DoS attacks are used to destroy information and access restricted areas of a company's information system.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.8/5
(37)

The Gramm-Leach-Bliley Act

(Multiple Choice)
4.8/5
(44)

Evil twins are

(Multiple Choice)
4.9/5
(31)

In a client/server environment, corporate servers are specifically vulnerable to

(Multiple Choice)
4.8/5
(39)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.8/5
(40)

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

(True/False)
4.9/5
(43)

The communications lines in a client/server environment are specifically vulnerable to

(Multiple Choice)
4.7/5
(38)

The Sarbanes-Oxley Act

(Multiple Choice)
4.8/5
(33)

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

(True/False)
5.0/5
(37)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.7/5
(45)

Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.

(Essay)
4.8/5
(32)

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

(Multiple Choice)
4.9/5
(33)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.8/5
(38)

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.8/5
(35)

Smaller firms may outsource some or many security functions to

(Multiple Choice)
4.9/5
(40)

________ is malware that logs and transmits everything a user types.

(Multiple Choice)
4.8/5
(40)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.9/5
(45)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)